Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android

Size: px
Start display at page:

Download "Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android"

Transcription

1 Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android Huda Ubaya Department of Computer Engineering, Faculty of Computer Science, Universitas Sriwijaya Jl. Raya Palembang - Prabumulih Km. 32 Indralaya, Ogan Ilir, South Sumatra [email protected] ABSTRAKSI Sejak akhir tahun 1990-an, orang-orang telah menikmati gaya hidup yang nyaman. Perangkat mobile yang didukung oleh perkembangan jaringan nirkabel telah menyebar ke seluruh dunia. Orang-orang dapat memperoleh informasi, memesan tiket, mengunduh lagu dan melakukan transaksi komersial yang disebut mobile commerce. Aplikasi mobile commerce menjadi aplikasi yang paling digemari bagi para pengguna perangkat mobile yang menginginkan melakukan transaksi bisnis dan keuangan dengan mudah dan aman, kapan saja dan dimana saja mereka berada. Saat ini penggunaan uang tunai secara fisik sedang mengalami penurunan popularitas di dunia bisnis, karena mulai digantikan oleh pembayaran non-fisik yang sering disebut uang elektronik (electronic money, e-money). Sebuah teknologi penting di balik pembayaran mobile adalah Near Field Communication (NFC). Sebagai indikasi bahwa NFC mempunyai potensi bisnis yang luar biasa, perusahaan terkemuka seperti Nokia, Microsoft, Visa Inc. dan MasterCard Worldwide dan NXP Semiconductors, secara aktif terlibat menggarapnya. Proses pembayaran yang terintegrasi dengan teknologi NFC berbasis sistem operasi mobile yang sedang trend saat ini yaitu Android yang mendukung teknologi NFC yaitu versi Gingerbread. Prototipe aplikasi bayar dirancang untuk 2 sisi pengguna yaitu pada sisi user sebagai konsumen dan pada sisi merchant sebagai pedagang/penjual dengan menggunakan handset yang sudah memiliki teknologi NFC yaitu Google Samsung Nexus S. Prototipe aplikasi bayar juga mengimplementasikan konsep keamanan dalam transaksi e-commerce dengan menggunakan protokol Tag-to-Tag sehingga kebutuhan pengguna untuk keamanan dan kenyamanan selama bertransaksi finansial terpenuhi. Kata Kunci: Android, NFC, pembayaran, mobile, Tag-to-Tag, e-money ABSTRACT Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced by electronic money (e-money). An important technology behind mobile payments is now called Near Field Communication (NFC). As an indication that the NFC has tremendous business potential, leading companies like Nokia, Microsoft, ISSN: (Print) 1

2 Visa Inc., and MasterCard Worldwide and NXP Semiconductors, is actively engaged on them. Payment processing integrated with NFC technology based mobile operating system that is a trend today, Android. The prototype application is designed to pay for the user side as consumer and the merchant side as a trader or seller by using the handset that already have NFC technology is Google Samsung Nexus S. This application prototype also implements the concept of security in e- commerce transactions by using the protocol Tag-to-Tag so that the user needs for security and comfort during the financial transaction are met. Keywords: Android, NFC, payment, mobile, Tag-to-Tag, e-money 1. INTRODUCTION Since the early 2000's, wireless networks have been developed in Europe and Asia. Currently, the penetration rates of mobile devices in the countries reach 80-90%. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Analysts predict there are three main regions for mobile payments is the Far East Asia and China, Western Europe and the United States, which as a whole will account for more than 70 percent of overall mobile payment in financial transactions in 2013 [1]. An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that the NFC has tremendous business potential, leading companies such as Nokia, Microsoft, Visa Inc., And MasterCard Worldwide and NXP Semiconductors, actively engaged in the NFC Forum, a nonprofit group comprised of industry players both technical and non-technicalminded to make a standard NFC-based transactions. In this thesis offers a prototype payment application using mobile phone device in which the technology is already integrated Near Field Communication (NFC). The discussion in this research focused on the security of NFC based communication when making the payment process between user and merchant. This study protocol implements Tag-to-Tag as NFC based communication security protocols. Testing is done by simulating the actual payment process by using 2 mobile devices Samsung Nexus S, each of which acts as a user and merchant. 2. MOBILE COMMERCE Mobile commerce is the buying and selling of goods or services through wireless devices such as mobile phones, personal data assistants (PDAs), smart phones and handheld gaming devices. Mobile commerce is also described as any transaction with monetary value which conducted through mobile telecommunications networks. Mobile commerce using mobile devices to communicate interact and conduct transactions over mobile networks or wireless networks. Mobile commerce is all about the wireless e-commerce using mobile devices to conduct business on the internet. Mobile commerce is also defined as the exchange value or the purchase 2 ISSN: (Print)

3 and sale of financial products, services or information on the internet using mobile devices. Mobile commerce according to Ericsson ( is the trusted transaction services through mobile devices to exchange goods and services between consumers, merchants and financial institutions. So during the transaction or transfer money to an intermediary mobile device, it can be categorized as mobile commerce. [2] Mobile commerce seen globally is very helpful and very beneficial for users but also has its advantages and disadvantages. The advantages of mobile commerce are; 1. customer satisfaction, cost savings and new business opportunities, 2. transactions can be done anywhere and anytime, 3. owner has control over the data while the mobile device can be synchronized, 4. allow for considerable profit, and customer relations became closer. 3. MOBILE PAYMENT Mobile payments [3][8][9][10] are also defined as the process of exchanging financial value between two entities using mobile devices to pay for a product or service. As depict in Figure 1, alternative payment options that consumers able to pay for products or services anywhere and anytime with the convenience of using mobile devices such as mobile phones, or smart phone. The system is designed to operate using wireless technology (wireless) such as Infrared, Bluetooth, Wi-Fi (802.11), WiMAX (802.16) and the latest technology that is Near Field Communication (NFC). NFC Handset User NFC Handset Merchant User Merchant count Payment amount confirmation E-money record receipt checkout preparing Figure 1. The process of paying The main driving factor of mobile payments is the use of mobile phones are increasingly widespread and evenly, and the trend toward electronic money (digital cash). Mobile payments have three functions: 1. Enhance consumer convenience / user by providing the flexibility to use this service anytime and anywhere, or in other words, mobile payments provide an economical solution to save time and money. ISSN: (Print) 3

4 2. Promoting competition opportunities in the payments market. Mobile payments offer new services to market and facilitate the payment of the effectiveness of using the payment system by introducing the concept of electronic money. 3. Offers new opportunities for mobile service providers and financial institutions in the mobile market with a variety of new and innovative business models. 4. NEAR FIELD COMMUNICATION (NFC) Near Field Communication (NFC) [4][5] is a new wireless connectivity technologies to the radius of the short range, which evolved from the combination of contactless identification and interconnection technologies (RFID). NFC operates at a frequency of MHz and has a data transfer rate of up to 424 Kbps. Effective communication and optimal between two NFC-enabled devices occurs when they are at a distance of 0 to 10 cm. Simple movement as twist or swing closer connections between devices can initiate NFC, which will also be compatible with Bluetooth or Wi-Fi (show in Figure 2). Figure 2. NFC Technology NFC technology is a combination between the smartcard and reader that is planted in a single device, such as mobile phones or smart phones. With the NFC device planted on a mobile device, then the transaction activities such as micropayments or payment transactions can be done by juxtaposing it to the NFC reader, which is at the terminal point of sale (POS) at the location of the transaction. With a feature like this then NFC referred to as device that supports the contactless transaction. Figure 3. NFC operation modes 4 ISSN: (Print)

5 As for some applications that can be developed using NFC technology are as follows. 1. Ticketing NFC can provide the ability for users to perform secure payment processing, shopping with electronic money, and can also make purchases, sales and electronic ticketing, such as music tickets, airline tickets, bus tickets and more. 2. Electronics key An example is the use of mobile phone as car keys, house keys or office keys. 3. Identification In addition, NFC can make things possible that your mobile phone will be used as identity documents. 4. Social networking Data stored on the tag objects such as a DVD box or poster can be accessed by mobile phone for example, to upload movie trailers, street maps, show schedules, comments about events and much more. 5. Set-up Service To avoid complex configuration process, NFC can be used to set up other wireless technologies like Bluetooth and wireless LAN. 5. ADVANCED ENCRYPTION SYSTEM (AES) Encryption is a block cipher symmetric key cipher which operates on the length groups of bits are often called blocks with the same transformation. When a block cipher encryption process takes n-bit block of plaintext as input and outputs the same amount with the input n-bit block cipher as well as text. After the delivery process, the receiver section will perform the decryption process which in principle is similar to the encryption process at the sender (transmitter) is decryption algorithm will take the same n-block cipher with a secret key and produce original n-bit block of plain text. [6][7] Rijndael supports key length of 128 bits to 256 bits with 32 bits step. Key length and block size can be selected independently. Because AES is determined that the block size must be 128 bits and key length should be 128, 192, and 256 bits, then known as AES-128, AES-192, AES-256. A de-facto, there are only two variants of AES, namely AES-128 and AES-256, because the user will very rarely use 192-bit key length. Since AES has a key length of at least 128 bits, the AES resistant to exhaustive key search attack with current technology. With 128-bit key length, then there are 2, x 1038 possible keys. If used a machine with one billion processors in parallel, each one can calculate a lock every one Pico second, it would take 1,010 years to try all possible keys also Rijndael operates in the orientation of bytes to allow for an efficient implementation of the algorithm into software and hardware. ISSN: (Print) 5

6 6. ANDROID Android [11][12] is an operating system developed by Google, which promises openness, affordability, open source, and quality framework, to meet the needs of the operating system that supports standard and publishing APIs and can be utilized as a whole with low cost. Until now, Android has released several versions of Android to refine the previous version. Besides according numbering, on every version of Android there is a code name based on the names of the dessert. Android 1.5 released on 30 April 2009 was named Cupcake, Android 1.6 was released on 15 September 2009 was named Donut, and for the tablet version of Android 3.2 was released in May 2011 was named Honeycomb while for mobile Android phone last version was released on September 2, 2011 with the name of Gingerbread with tech support for Near Field Communication (NFC). Android's built-in on the Linux kernel (open Linux kernel), with a virtual machine that has been designed and to optimize use of memory and hardware resources on the mobile device environment of the Dalvik virtual machine. DalvikVM has the advantage of using the base processor registers because the device has been optimized for mobile phone-based execution registers. The application has a life cycle (cycle) is initiated when the Android initialize the component to respond to the intent to complete when the instance is destroyed. Figure 4 shows the process life cycle of an Android application. 7. TAG-TO-TAG PROTOCOL Figure 4. Android s lifecycle For security during the payment [14] process takes place between the merchant and the user is required optimum safety. In this study used the AES algorithm with 128-bit key length is the author of the quite reliable, especially on mobile devices with limited computing resources. As for the design of security protocols of 6 ISSN: (Print)

7 communication between the merchant and the user during the process of payment transactions take place depicted in Figure 5, which uses protocol Tag-to-Tag [13] with the following caption. MERCHANT (M) USER (U) a m M1 a u U1 b m M2 b u U2 c m c u Figure 5. Tag-to-Tag Protocol 1. Starting from the process a m and a u, merchant and user generate a session key shared (shared session key) that K SM and K SU are used in the process of encryption and decryption takes place during the payment process. 2. Merchant sends a message to the user that contains the ID number, transaction number, the payment amount, encrypted account number, authentication code, and the K SM key. 3. User sends a message to the merchant that contains the ID number, transaction number, balance, an encrypted account number and password, authentication code, and the K SU key. 4. In the process of b m, merchant check the amount of payment and the balance position of the user. If AMOUNT <ACCBALANCE then the PAY_M value is 1 (ACCEPT, the payment is received). And if AMOUNT> ACCBALANCE then the value of PAY_M is 0 (REJECT, the payment is rejected). 5. In the process b u, user checks the amount of payment and the balance position. If AMOUNT <ACCBALANCE then the PAY_M value is 1 (ACCEPT, the payment is received). And if AMOUNT> ACCBALANCE then the value of PAY_M is 0 (REJECT, the payment is rejected). Status of PAY_P validated by confirmation from the user by pressing the 'OK' or 'NO' on the screen. 6. Merchant sends a message to the user that contains the ID number, transaction number, payment amount, PAY_M, the encrypted account number, MAC M, and K SM. 7. Users send a message to the merchant that contains the ID number, transaction number, payment amount, PAY_P, account numbers and passwords are encrypted, MAC P, and K SP. 8. In the process of c m, the merchant verifies the value of PAY_P. If PAY_P = 'ACCEPT' & PAY_M = 'ACCEPT' the payer payment of funds deposited on the merchant's account, transactions are recorded and printed receipts. In the c u process, the user verifies the value of PAY_M. If PAY_P = ISSN: (Print) 7

8 'ACCEPT' & PAY_M = 'ACCEPT' balance payer then the position will be reduced and the status of the application recorded payment. 8. SYSTEM DESIGN Basically the system consists of two applications, namely on the merchant's payment application and pay application on the user. Application on the user or called nbelanja can do some things that 1. nbelanja provide the login page to activate the security features for transactions took place with the merchant, 2. nbelanja receives payment data from nbayar from the merchant, 3. nbelanja provides features to better secure PIN transactions taking place between the user and the merchant, 4. see the balance on the user by setting the value of the maximum balance of Rp.1,000,000 (one Million Rupiahs) to the level of micro-payments, 5. transaction record, with this facility the user can do and see footage of payment transactions that have been made between the user and merchant. Applications on the merchant or called nbayar there are several functions that can be done by merchant 1. payment, serves to provide payment data information that must be paid by the user, in this process occurs the connection / relationship between p2p users with a merchant to exchange information and confirmation with an encrypted channel, 2. records of transactions, recording transactions serve to see who has done between the merchant and the user which includes transaction time (day, date and hour), number of transactions and the amount paid by the user. Users do pay process by juxtaposing their device into the merchant device. Then the user receives payment data that must be paid according to results of previous shopping process from the merchant via the communication peer-to-peer based NFC. After the user approve the payment and enter your PIN, if true then the application will check the balance on the user's position and if sufficient then it will be forwarded to the process of sending data to the merchant's payment confirmation via peer-to-peer NFC-based payment transactions and make the records While in the merchant communicates with the user to transmit payment data information that must be paid users using peer-to-peer NFC-based channel that is encrypted in accordance with the security protocol in Section VII. Furthermore, the merchant awaiting confirmation of payment from the user through the same channel and after receiving confirmation, the application will record the transaction records in the database. nbelanja special applications on the user added features of electronic money (emoney, virtual money) that will be created in the encrypted form of a special file that can only be accessed by the main database with encryption and decryption process-based AES 128 bits. Restrictions on the implementation process of designing and manufacturing in this research utilizing pure NFC technology available on the Samsung Nexus S. 8 ISSN: (Print)

9 9. RESULTS AND DISCUSSION In this test performed simulations of merchant payment processing to the user. The process of implementation and testing of applications on hardware made directly to the Google Samsung Nexus S in pairs. While testing performed, the running time of each activity on the application process can be seen using DDMS and log process data delivery process from the user to the merchant. Table 1 Results of functional testing and processing time in the user Testing Activity Result Success Time (ms) NFCBelanjaActivity 389 TopupActivity 431 RekamActivity 356 HistoryActivity 355 P2PActivity 2,531 SaldoActivity 257 KonfirmasiActivity 405 From the test results as shown in Table 1 and 2 can be seen that in every activity does not require a long processing time less than 1 second except for P2PActivity. To process P2PActivity need longer time because it takes longer to process communication between 2 devices as well as encryption and decryption process, but not so influential because the time is only about 2,531 ms or equal to 2.5 s. Table 2 Results of functional testing and processing time at the merchant Testing Activity Result Success Time (ms) NFCMerchantActivity 354 HistoryActivity 282 P2PActivity 2,523 KonfirmasiActivity 544 RekamActivity 343 In addition to functional testing and processing time on the activity carried out safety testing also performed by comparing the time required to perform encryption and decryption for processing load 1,000 times. Figure 6 and 7 show the results of safety testing for encryption and decryption respectively. ISSN: (Print) 9

10 Time (ms) Time (ms) Computer Engineering and Applications Vol. 1, No. 1, June 2012 AES-128 Encryption on Android 2.3 crespo vision Data Length (bytes) Figure 6. Comparison of the AES 128 bit encryption AES-128 Decryption on Android 2.3 crespo vision Data Length (bytes) Figure 7. Comparison of 128-bit AES decryption time Analysis of test results from both applications and hardware used to is already running well. Hardware test results are very good with the use of the handset that is designed specifically with NFC technology. Overall nbelanja applications for users and nbayar for merchants with design is not real but still in the form of simulation has been able to show workflow processes as in real conditions. But nevertheless still many shortcomings and the need for more in-depth study covers the following issues 1. The security level of the interaction between applications and security in accessing the electronic money (e-money), 2. The process going forward must be made client - server to better be able to control the system from the merchants and third-party security including authentication and centralized management and database management better, 10. CONCLUSSIONS AND FUTURE WORKS Several conclusions can be drawn from this study are as follows. 1. Applications nbelanja and nbayar created as a model process payment with NFC technology that allows users to make the process pay by using mobile devices. Applications created with ease of understanding and designing made simple and adapted to process pay a more effective and user friendly making it easier for users to make the payment process. Application created a prototype 10 ISSN: (Print)

11 that shaped the future still remains much to do development and improvement of existing models. 2. The database used is a SQLite database which is owned by the Android platform so that the process will be faster and less computing resources in the process of reading the database. 3. Application processing time is done not too long and still in the process tolerance limits, not more than 1 second while for communication and information exchange process P2P NFC about 2.5 seconds. Future works of this study are: 1. Because this research is still a prototype or model of the actual process so that there are limitations to its use in real, then it is advisable in the future to be able to collaborate on NFC technology with the model client - server so that the process would be better. Combining the use SQLite databases and database servers like MySQL, Posgresql, or Oracle on the part of merchants enables the development process for the better, so that the merchants themselves can make the process better database management and more controlled. 2. Security process is still limited in the process of exchanging data / information from the user to the merchant through the device and need to be improved so that more secure from intrusion irresponsible for example by use of embedded device Secure Element as an important information storage medium 3. Further development is recommended to further involve a third party or third party such as Bank, Issuer or TSM (Trusted Service Management) so that the process of pay in this application is more real because of the process of authentication and verification process of such third party. REFERENCES [1].,, Over 400m Mobile Ticketing Users by 2013, 20 Juni 2011, WIB. [2]. Ade Hendraputra, Arif Budiono, Bayu Erfianto, Wardani Muhammad (2009). Aplikasi E-Commerce. Politeknik Telkom Bandung, Indonesia. [3]. S. Nambiar; C. T. Lu; and L. R. Lian (2004). Analysis of Payment Transaction Security in Mobile Commerce, in Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI'04). Nevada, USA, pp [4].,(2011). Introduction to NFC, Forum Nokia June 22, 2011, GMT+7. [5].,(2011). Near Field Communication Technology and the Road a head, Forum NFC June 30, 2011, GMT+7. [6]. Dr. Thalal Alkharabi.(2007), Encryption Block Chiper, Lecture Notes, August 28, 2011, 08:24 GMT+7. [7]. Stalling W (2005). Cryptography and Network Security: Principles and Practice. Prentice Hall, Fourth Edition. ISSN: (Print) 11

12 [8]. Dandash Osama; Wu Xianping; Le Phu Dung (2005). Wireless Internet Payment System Using Smart Cards, Proceeding Of International conference on Information Technology : Coding and Computing. IEEE Xplore, /05 [9]. Rafael Martinez-Pelaez; Fransisco Rico-Novella; Christina Satizabal and Jhon J Padilla (2008). Performance Analysis of Mobile Payment Protocols over the Bluetooth Wireless Network, PerformanceAnalysisOfMobilePaymentProtocols.pdf, August 30, 2011, 08:21 GMT+7. [10]. Supakorn Kungpisdan (2005). Modelling, Design, and Analysis of Secure Mobile Payment Systems, August 12, 2011, 09:31 GMT+7. [11]. Reto Meier (2010). Professional Android 2 Application Development. Willey Publishing Inc, Indianapolis. [12]. Dominik Gruntz (2011). NFC with Android. University of Applied Sciences Northwestern Switzerland, Brugg-Windisch, Sept 16, 2011, GMT+7. [13]. Husni, E.; Kuspriyanto; Basjaruddin, N.; Purboyo, T.; Purwantoro, S.; and Ubaya, H. (2011). Efficient Tag to Tag NFC Protocol for Secure Mobile Payment, in Proceeding Of International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME). Bandung, Indonesia, pp [14]. HaselSteiner Ernst; Breitfub Klemens ( ). Security in Near Field Communication, SecurityinNFC.pdf, August 10, 2011, 11:15 GMT+7. [15]., ( ), Moserware, Jeff Moser s Software Development Adventure, [16]. Husni, E., Kuspriyanto, Basjaruddin, N., Purboyo, T., Purwantoro, S., and Ubaya, H., (2011), Efficient Tag to Tag NFC Protocol for Secure Mobile Payment, in Proceeding Of International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, Indonesia, pp ISSN: (Print)

The e-payment Systems

The e-payment Systems The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic

More information

Electronic Commerce and E-wallet

Electronic Commerce and E-wallet International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: [email protected]

More information

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

Ingenious Systems. Evolute System's. Mobile Payment. Initiative Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial

More information

Mobile Near-Field Communications (NFC) Payments

Mobile Near-Field Communications (NFC) Payments Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments

More information

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Welcome to the age of Universal Commerce commerce that is integrated, personalized, secure, open, and smart. The lines between in-store

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Chapter 5. Online Payment System. Types of Payment Systems. Cash Checking Transfer Credit Card Stored Value Accumulating Balance

Chapter 5. Online Payment System. Types of Payment Systems. Cash Checking Transfer Credit Card Stored Value Accumulating Balance Chapter 5 Online Payment System Copyright 2007 Pearson Education, Inc. Slide 5-64 Types of Payment Systems Cash Checking Transfer Credit Card Stored Value Accumulating Balance Copyright 2007 Pearson Education,

More information

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months

More information

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013 Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for

More information

E-commerce refers to paperless exchange of business information using following ways.

E-commerce refers to paperless exchange of business information using following ways. E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods

More information

RoverPal - A Mobile Payment Application

RoverPal - A Mobile Payment Application White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run

More information

Framework of e-commerce

Framework of e-commerce Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed

More information

Credit card: permits consumers to purchase items while deferring payment

Credit card: permits consumers to purchase items while deferring payment General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily

More information

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4 CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY

More information

Chapter 10. e-payments

Chapter 10. e-payments Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss

More information

Loyalty Systems over Near Field Communication (NFC)

Loyalty Systems over Near Field Communication (NFC) Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to

More information

Store Logistics and Payment with Near Field Communication

Store Logistics and Payment with Near Field Communication with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary

More information

DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION

DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION Yoonho Nam, Changhoon Lee, Youngman Jung, Woongryul Jeon and Dongho Won Information Security Group, Sungkyunkwan

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

Mobile Electronic Payments

Mobile Electronic Payments Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Your gateway to card acceptance.

Your gateway to card acceptance. MERCHANT SERVICES Authorize.Net Solutions Your gateway to card acceptance. Processing transactions reliably and securely is essential to your business. That s why BBVA Compass and Authorize.Net, a leading

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems

CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems CHAPTER 6 E-commerce Payment Created by, David Zolzer, Northwestern State University Louisiana Copyright 2002 Pearson Education, Inc. Slide 6-1 Copyright 2002 Pearson Education, Inc. Slide 6-2 Learning

More information

Significance of Tokenization in Promoting Cloud Based Secure Elements

Significance of Tokenization in Promoting Cloud Based Secure Elements Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,

More information

BGS MOBILE PLATFORM HCE AND CLOUD BASED PAYMENTS

BGS MOBILE PLATFORM HCE AND CLOUD BASED PAYMENTS HCE AND CLOUD BASED PAYMENTS 1 Contactless payments are vital for further development of the payment industry. More than 3 mln POS terminals around the globe can accept contactless payments. Mobile phones

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH

EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE FACULTY OF COMPUTER

More information

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005 Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.

More information

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION MAKE THE SWITCH TO MONEXgroup ecommerce I Mobile I Wireless I Integrated I Countertop Solutions PAYMENTS IN-STORE PAYMENTS ON-THE-GO PAYMENTS ONLINE Accept

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]

More information

IMPLEMENTATION OF VOICE RECOGNITION TECHNOLOGY ON ENGLISH LEARNING APPLICATION BY SELF LEARNING BASED ON ANDROID DEVICE

IMPLEMENTATION OF VOICE RECOGNITION TECHNOLOGY ON ENGLISH LEARNING APPLICATION BY SELF LEARNING BASED ON ANDROID DEVICE F.2 IMPLEMENTATION OF VOICE RECOGNITION TECHNOLOGY ON ENGLISH LEARNING APPLICATION BY SELF LEARNING BASED ON ANDROID DEVICE Derwin Suhartono *, Calvin, Mery Yustina, Shandy Kurniawati, Haryono Soeparno,

More information

CyberSource and NetSuite Getting Started Guide

CyberSource and NetSuite Getting Started Guide CyberSource and NetSuite Getting Started Guide Abstract A comprehensive guide to setting up CyberSource and NetSuite to accept payments Table of Contents This document explains the different steps to set

More information

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Design and Implementation of Automatic Attendance Check System Using BLE Beacon , pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,

More information

Contents. 2 Welcome. 20 Settings. 3 Activation Steps. 4 Introduction. 4 Purpose. 20 Offline Mode Change Password. 5 Key Features

Contents. 2 Welcome. 20 Settings. 3 Activation Steps. 4 Introduction. 4 Purpose. 20 Offline Mode Change Password. 5 Key Features User s Guide Contents 2 Welcome 3 Activation Steps 4 Introduction 4 Purpose 5 Key Features 6 Activation 8 Using the System 8 Login 9 Credit Sale 10 For Swipe Capable Devices 10 For Manual Entry 12 Cash

More information

How to connect your D210 using Bluetooth. How to connect your D210 using GPRS (SIM Card)

How to connect your D210 using Bluetooth. How to connect your D210 using GPRS (SIM Card) D210 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D210 with Mobile Phone 5 Using D210 with wireless (Wi-Fi) router 6 Using D210 with GPRS (requires

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

The Goods, the Payment and the Mobile!

The Goods, the Payment and the Mobile! WHITEPAPER The Goods, the Payment and the Mobile! This whitepaper is an extract from: Mobile Payments for Digital & Physical Goods Analysis, Markets & Vendor Strategies 2011-2015... information you can

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

The Comprehensive, Yet Concise Guide to Credit Card Processing

The Comprehensive, Yet Concise Guide to Credit Card Processing The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,

More information

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the

More information

rf Technology to automate your BUsiness

rf Technology to automate your BUsiness Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,

More information

Near Field Communication in Cell Phones

Near Field Communication in Cell Phones Near Field Communication in Cell Phones Annika Paus 24.07.2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 Standards

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

Blaze Vault Online Backup. Whitepaper Data Security

Blaze Vault Online Backup. Whitepaper Data Security Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup

More information

bi on Solution white paper

bi on Solution white paper bi on Solution white paper Billon Solution Overview Despite concerted efforts for years, cash has not yet been eliminated. Mostly because not everyone has a bank account and debit card - an estimated 2.5

More information

Paytooth - A Cashless Mobile Payment System based on Bluetooth

Paytooth - A Cashless Mobile Payment System based on Bluetooth Paytooth - A Cashless Mobile Payment System based on Bluetooth Rushabh Patel 1, Akhil Kunche 1, Nihar Mishra 1, Zakwan Bhaiyat 1, Prof. Rahul Joshi 2 1,2 Symbiosis Institute of Technology (SIT) Affiliated

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

DATA TRANSMISSION USING AES ENCRYPTION VIA EMAIL AND SMS ARIF HANAFI BIN SHARIF KATULLAH

DATA TRANSMISSION USING AES ENCRYPTION VIA EMAIL AND SMS ARIF HANAFI BIN SHARIF KATULLAH DATA TRANSMISSION USING AES ENCRYPTION VIA EMAIL AND SMS ARIF HANAFI BIN SHARIF KATULLAH A thesis submitted in fulfillment of the requirements for the award of the degree of the Bachelor of Computer Science

More information

NFC Based Equipment Management Inventory System

NFC Based Equipment Management Inventory System Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA

HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA A thesis submitted in fulfillment of the requirement for the awards of Bachelor of Computer Science (Computer Systems & Networking) with Honours Faculty of

More information

BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE

BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE FACULTY OF COMPUTER SYSTEM & SOFTWARE ENGINEERING UNIVERSITI

More information

MOBILE PAYMENT SECURITY: BLE OR NFC

MOBILE PAYMENT SECURITY: BLE OR NFC NEW SCIENCE TRANSACTION SECURITY ARTICLE MOBILE PAYMENT SECURITY: BLE OR NFC SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction security

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

NEWSLETTER PAX TECHNOLOGY. www.pax.com.cn. March 2014. Your Payment Partner of Choice

NEWSLETTER PAX TECHNOLOGY. www.pax.com.cn. March 2014. Your Payment Partner of Choice Your Payment Partner of Choice www.pax.com.cn March 2014 Your Payment Partner of Choice www.pax.com.cn March 2014 S-Series Products S800 Countertop Payment Terminal S900 Mobile Payment Terminal S300 Integrated

More information

01. Introduction of Android

01. Introduction of Android 01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment

More information

JOB AGENT MANAGEMENT SYSTEM LU CHUN LING. A thesis submitted in partial fulfillment of. the requirements for the award of the degree of

JOB AGENT MANAGEMENT SYSTEM LU CHUN LING. A thesis submitted in partial fulfillment of. the requirements for the award of the degree of JOB AGENT MANAGEMENT SYSTEM LU CHUN LING A thesis submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Sciences (Software Engineering) FACULTY OF COMPUTER

More information

Android pay. Frequently asked questions

Android pay. Frequently asked questions Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and

More information

The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com

The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

Grow with our omni-channel payment processing technologies and merchant services.

Grow with our omni-channel payment processing technologies and merchant services. Grow with our omni-channel payment processing technologies and merchant services. Get ready for growth Payment processing solutions ecommerce mcommerce In-app payments Virtual terminal Card present EMV

More information

INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN

INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN i INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Science

More information

Mobile Cloud & Mobile Ticketing

Mobile Cloud & Mobile Ticketing Mobile Cloud & Mobile Ticketing T-109.4300 Network Services Business Models Lecture Antero Juntunen Researcher [email protected] Contents Mobile Cloud Introduction Drivers Restraints Conclusions Mobile

More information

INTRODUCTION AND HISTORY

INTRODUCTION AND HISTORY INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development

More information

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc. Copyright 2007 Pearson Education, Inc. Slide 6-1 E-commerce business. technology. society. Third Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 6-2 Chapter

More information

PAYMENT SYSTEMS. E-Commerce Winter 2011 Marek Maurizio

PAYMENT SYSTEMS. E-Commerce Winter 2011 Marek Maurizio PAYMENT SYSTEMS E-Commerce Winter 2011 Marek Maurizio THE PAYMENT REVOLUTION In 2011 we are still in the middle of a payment system revolution Electronic payments are taking the place of cash and checks

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Merchant Payment Solutions

Merchant Payment Solutions Merchant Payment Solutions Credit Card Processing Diagram CUSTOMER S CREDIT CARD ISSUING BANK CUSTOMER 4 5 $ MERCHANT S BUSINESS MERCHANT S BANK ACCOUNT MERCHANT S BANK 9 CREDIT CARD NETWORK 8 INTERNET

More information

How to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card)

How to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card) D200 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D200 with Mobile Phone 5 Using D200 with wireless (Wi-Fi) router 6 Using D200 with GPRS (requires

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

Euronet s Contactless Solution

Euronet s Contactless Solution Serving millions of people worldwide with electronic payment convenience. Euronet s Contactless Solution Fast, Secure and Convenient Transactions with No Swiping, PIN or Signature Copyright 2011 Euronet

More information

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating Given recent payment data breaches, clients are increasingly demanding robust security and fraud solutions; and Financial institutions continue to outsource and leverage technology providers given their

More information

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.

More information

Threat Modeling for offline NFC Payments

Threat Modeling for offline NFC Payments Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,

More information

Industrial Networks & Databases

Industrial Networks & Databases Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]

More information

American Express Contactless Payments

American Express Contactless Payments PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information

the better way to pay

the better way to pay the better way to pay we are DOKU PT Nusa Satu Inti Artha (dba DOKU ) is Indonesia s largest and fastest growing provider of electronic payment. We provide electronic payment processing, online and in

More information

Active RFID Technology for Asset Tracking and Management System

Active RFID Technology for Asset Tracking and Management System TELKOMNIKA, Vol.11, No.1, March 2013, pp. 137~146 ISSN: 1693-6930 accredited by DGHE (DIKTI), Decree No: 51/Dikti/Kep/2010 137 Active RFID Technology for Asset Tracking and Management System Evizal, Tharek

More information

Merchant Payment Solutions

Merchant Payment Solutions Merchant Payment Solutions What We Do Connecting your Web site to the payment processing networks is typically beyond the technical resources of most merchants. Instead, you can easily connect to the Authorize.Net

More information